Pay Online and Earn Your FREE Hotel Stay in Dubai. See eligible courses here.

Mobile Device Security and Ethical Hacking

Video preview
No available sessions at this moment.
Get in touch with our Training Advisior to find out about the next available sessions.
DownloadDownload Brochure

Course Overview

Mobile devices are everywhere, and they bring security concerns with them. Explore, in-depth, aspects of mobile security.

Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices. Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Explore encryption and some practical use cases in the mobile enterprise.

Ethical Hacking is extremely important for enterprises. It helps find weaknesses and vulnerabilities of systems and networks before malicious hackers can. Explore ethical hacking.

Discover the requirements and objectives of the CEHv10 (312-50) exam and explore threats, the threat landscape, what motivates threat actors, and threat defense types. Watch the videos in this course and learn how to describe the questions associated with the CEHv10 exam, identify a vulnerability in IT security and recite various basic terms in IT security. You'll also observe how to provide an example of a network threat, determine a threat category, and outline a concept in threat management.

Explore the concepts of hackers and discover the common phases of hacking. In this course, you will examine what makes a good hacker and the different types of hackers like Script Kiddies, White Hats, and Black Hats. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify the purpose of each type of hacker, recall the type of hacker who simply executes an exploit, describe the difference between active and passive recon, identify tools used during each phase of the hacking process, and list the phases of the hacking process.

Key Takeaways

Describe current mobile devices and form factors
Describe the current state of mobile device security
Describe usage scenarios for cryptography
Describe a vulnerability in IT security
Identify the purpose of each type of hacker

Brand Logo
At Skillsoft, we believe every individual has the poten-tial to be amazing. Our vision is to unleash that poten-tial through the power of learning. As the world’s largest provider of professional digital learning, Skill-soft delivers:
• Online learning that includes a broad catalogue of in-demand topics, built with deep expertise in the subject matter and scientifically proven learning science;
• Engaging learning experiences ranging from micro-learning to complete journeys and professional certifications that have impacted nearly half a billion people worldwide and certified more IT professionals than any firm on the planet; and
• A powerful, flexible, and engaging cloud-native plat-form designed to seamlessly integrate both with lead-ing HCM solutions and the natural flow of work.
Unlike other providers, Skillsoft is inclusive, with learning options for all. Our effectiveness, variety and global reach are unmatched.

Course Outline

Who Should Attend?

Related Courses


What language will the course be taught in and what level of English do I need to take part in an LEORON training program?
Most of our public courses are delivered in English language. You need to be proficient in English to be able to fully participate in the workshop and network with other delegates. For in-house courses we have the capability to train in Arabic, Dutch, German and Portuguese.
Are LEORON Public courses certified by an official body/organization?
LEORON Institute partners with 20+ international bodies and associations.We also award continuing professional development credits (CPE/PDUs) for:1. NASBA (National Association of State Boards of Accountancy) 2. Project Management Institute PDUs 3. CISI credits 4. GARP credits 5. HRCI recertification credits 6. SHRM recertification credits
What is the deadline for registering to a public course?
The deadline to register for a public course is 14 days before the course starts. Kindly note that occasionally we do accept late registrations as well, but this needs to be confirmed with the project manager of the training program or with our registration desk that can be reached at +1071 4 1075 5711 or [email protected].
What does the course fee cover?
The course fee covers a premium training experience in a 5-star hotel, learning materials, lunches & refreshments, and for some courses, the certification fee and membership with the accrediting bodies.
Does LEORON give discounts?
Yes, we can provide discounts for group bookings. If you would like to discuss a discount on a corporate level, we will be happy to talk to you.